Special Issue on Secure Data Science and Big Knowledge
• 大类 : 工程技术 - 2区
• 小类 : 计算机：信息系统 - 1区
1. Significance and Description
Massive growths in data storage, communication, and processing technologies have ushered in the era of big data. Big data sources, such as smart vehicles, IoT devices, and sensor networks, differ from traditional data sources in both output volume and variety. It is therefore a non-trivial task to integrate these fragmented data into useful knowledge. Big Knowledge has emerged as a systematic approach to extract knowledge and value from big data. It aims to discover complex and evolving relationships among data entities. Although Big Knowledge has received considerable attention from researchers in recent years, many fundamental issues are still not fully understood. One aspect that urgently needs resolving is data security. Security is a multifaceted problem that has different meaning for different entities. Users who generate data wish to protect their privacy, and data servers need to defend themselves against data forgery, tampering, and leakage. While Big Knowledge is a promising method to translate big data into value, we must overcome these challenges to make it better serve us.
This special issue aims to gather recent advances in Big Knowledge and its security problems. We welcome researchers to discuss various aspects of big data privacy, integrity, and knowledge extraction. We encourage researchers to innovate new solutions to the key problems in this emerging field. In general, we do not accept survey papers.
Topics include but are not limited to:
Applications of machine learning in big data processing
Real time Big Knowledge extraction and updating methods
Applications of Big Knowledge
Privacy preserving methods in Big Knowledge mining
Novel protocols for secure big data communication
Privacy-aware data collection and storage methods
Side-channel attacks to big data servers
Big data integrity verification with blockchain and other techniques
Secure big data computing based on homomorphic encryption and other emerging cryptography techniques